Versions
3.3.5SE
17.9.1x1
3.13.6bS
3.16.5bS
17.13.1
17.4.2a
3.6.6E
17.5.1b
16.8.1d
3.10.1xbS
3.16.4aS
17.6.6
3.18.7SP
16.6.7
3.2.6SG
16.10.1s
3.13.3S
3.10.7S
3.8.2S
17.12.1w
16.12.1y
3.18.2aSP
3.2.2SG
3.11.0S
3.12.0aS
3.2.0SE
3.3.3SE
3.11.3aE
3.18.2S
3.9.0E
17.8.1
3.2.8SG
3.4.0SG
3.11.5E
3.2.10SG
3.10.8S
3.10.5S
16.4.2
17.2.1r
16.4.1
17.9.5
16.6.2
3.16.4dS
3.6.5bE
3.10.2E
17.3.6
3.5.8SQ
3.10.6S
17.4.1a
3.16.2S
17.11.1
3.14.4S
17.9.4a
17.6.6a
17.6.7
16.3.1a
3.12.3S
16.8.1b
17.3.8
16.6.8
17.6.3
3.7.1E
17.5.1c
17.2.1v
3.18.3SP
3.18.3bSP
16.3.2
17.9.4
16.6.9
16.4.3
17.14.1
17.3.5a
16.8.1
3.11.4S
3.14.0S
16.6.5
3.10.1S
16.5.1b
16.3.7
3.8.5E
17.9.5a
3.5.3E
16.12.1x
16.10.1a
3.2.11SG
3.3.4SE
3.15.0S
16.3.10
3.6.10E
3.14.2S
3.4.8SG
3.3.2XO
17.4.2
17.3.1x
16.7.2
16.12.3a
3.18.3S
3.15.1cS
3.6.7E
3.16.0S
3.16.4cS
17.4.1b
3.7.0S
16.5.3
16.10.1e
3.18.1bSP
16.9.2h
3.8.0S
3.4.7SG
16.7.3
3.5.1SQ
3.10.9S
17.3.2a
16.9.1d
16.3.9
16.12.1a
3.16.6bS
3.16.2bS
17.12.2a
16.7.4
3.2.2SE
3.6.0E
3.13.4S
3.16.2aS
16.8.1s
3.10.2tS
17.14.1a
3.16.4S
16.12.1t
3.9.1S
3.8.2E
16.12.1c
17.1.1
16.6.4a
3.17.3S
3.16.7S
17.3.1w
3.6.7aE
3.13.7S
17.6.1z1
3.4.6SG
3.4.4SG
3.3.1XO
3.15.1S
3.11.0E
3.6.8E
3.13.0aS
16.12.6a
3.16.3S
16.6.6
16.9.3
17.10.1b
3.5.7SQ
3.8.4E
16.2.1
17.6.1y
3.11.4E
16.10.1c
3.13.1S
3.18.2SP
3.18.4S
3.13.2aS
3.5.0SQ
3.xE
16.10.1b
3.10.2S
3.2.0SG
17.2.1a
3.3.0XO
3.4.2SG
3.17.1S
3.6.3E
3.7.7S
17.4.1
16.8.1e
3.9.1E
3.5.6SQ
3.7.2E
16.8.2
3.13.2S
3.8.6E
16.7.1a
3.7.4E
3.6.7bE
16.5.1a
16.12.5
16.6.4
16.8.1a
3.13.6S
17.7.1
3.18.1iSP
3.6.4E
3.3.1SE
17.12.1a
17.6.2
16.9.5f
16.3.1
3.10.4S
3.9.0aS
3.4.1SQ
3.11.7E
3.13.7aS
16.12.10
16.12.2
16.12.5b
16.12.9
3.3.0SG
16.3.11
3.6.0bE
17.8.1a
16.12.11
16.10.2
3.3.2SG
16.11.1b
16.2.2
3.5.0E
16.6.3
3.8.10eE
3.2.3SG
3.3.1SQ
17.7.1b
3.11.3E
16.12.4
3.18.4SP
3.7.5S
17.9.3
16.11.1
16.11.2
17.12.3
3.16.10S
17.3.4a
17.1.3
16.3.5b
3.16.4bS
17.12.2
3.9.2S
3.18.0aS
3.14.1S
17.11.1a
3.18.6SP
3.11.8E
17.3.3
17.3.2
3.6.2aE
17.13.1a
3.10.0S
16.8.3
3.18.9SP
3.16.7bS
17.3.1
3.3.2SE
3.11.1aE
3.8.5aE
16.11.1s
17.9.2
16.12.1
3.11.1E
3.18.1cSP
3.7.3E
17.9.1x
16.3.6
16.3.3
17.9.1a
3.16.1S
3.11.10E
3.18.1SP
3.13.5S
3.2.7SG
3.7.4S
3.4.5SG
17.3.4
17.10.1a
3.16.4gS
16.12.3
17.6.3a
3.2.9SG
17.9.1y1
16.12.1s
3.13.5aS
16.10.1g
3.5.2SQ
3.3.0SE
3.9.2bE
3.10.2aS
3.8.1S
3.15.3S
3.6.1E
3.13.0S
16.10.3
3.16.4eS
3.11.2E
3.8.8E
17.1.1s
3.2.0JA
3.17.2S
3.16.3aS
17.9.5b
16.12.4a
16.6.1
16.12.1z2
16.5.2
3.18.0SP
3.11.2S
3.6.9E
3.11.1S
3.6.5E
17.6.5a
3.16.0bS
3.13.8S
3.18.1gSP
16.6.5a
17.11.99SW
3.12.2S
3.9.1aS
17.5.1a
17.6.1a
3.2.5SG
3.7.6S
3.10.10S
3.10.3S
16.9.2
3.10.3E
3.2.3SE
16.1.3
3.15.4S
3.7.2S
3.2.1SE
3.8.7E
3.11.9E
16.8.1c
16.9.7
16.12.1w
17.6.1w
17.3.1a
3.8.10E
3.14.3S
17.10.1
3.8.3E
17.3.8a
16.7.1b
16.11.1a
3.16.8S
3.17.4S
16.9.4
17.6.5
3.8.9E
16.12.7
3.4.3SG
16.6.10
3.7.0E
16.6.4s
17.7.2
17.6.1z
16.10.1d
3.11.3S
3.12.1S
3.16.0cS
3.12.0S
16.7.1
3.18.1aSP
16.9.1b
16.3.4
16.9.1c
16.12.8
16.10.1f
17.3.5
3.18.1S
3.6.0aE
17.12.1
3.10.0E
3.18.1hSP
16.1.1
3.7.1aS
3.18.3aSP
3.12.4S
3.2.1SG
17.2.3
3.7.5E
17.5.1
17.6.1x
3.18.5SP
17.3.7
3.3.0SQ
17.9.2a
16.9.6
3.10.1E
16.1.2
3.5.4SQ
17.9.1w
16.9.2a
3.4.1SG
16.3.5
3.13.10S
3.13.9S
3.10.8aS
16.5.1
3.10.1aE
17.3.4c
16.12.3s
16.9.3a
3.11.6E
17.3.1z
3.7.4aS
3.16.9S
3.16.1aS
3.7.1S
16.12.10a
3.7.3S
3.15.2S
17.2.1
3.16.0aS
3.17.0S
17.12.1x
16.12.6
3.5.1E
17.6.4
3.8.1E
16.9.1
3.9.0S
3.7.2tS
3.16.5aS
16.12.1z1
3.6.2E
3.10.0cE
17.3.4b
17.9.1
3.7.0bS
3.2.4SG
17.7.1a
17.2.2
17.1.1t
3.13.6aS
3.18.8aSP
17.1.1a
16.9.1a
3.3.1SG
3.17.1aS
16.12.5a
16.9.5
17.12.1y
3.5.5SQ
17.9.1y
17.12.3a
3.5.3SQ
3.16.5S
unspecified
3.8.0E
17.3.5b
3.6.5aE
16.9.8
3.5.2E
3.4.0SQ
3.9.2E
16.12.2s
17.6.1
17.9.3a
3.16.6S
16.9.1s
16.3.8
3.18.0S
3.16.7aS
16.12.2a
16.10.1
3.10.1sE
Recent CVEs
CVE-2024-20467
A vulnerability in the implementation of the IPv4 fragmentation reassembly code in Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper management of resources during fragment reassembly. An attacker could exploit this vulnerability by sending specific sizes of fragmented packets to an affected device or through a Virtual Fragmentation Reassembly (VFR)-enabled interface on an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition. Note: This vulnerability affects Cisco ASR 1000 Series Aggregation Services Routers and Cisco cBR-8 Converged Broadband Routers if they are running Cisco IOS XE Software Release 17.12.1 or 17.12.1a.
CVE-2024-20464
A vulnerability in the Protocol Independent Multicast (PIM) feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient validation of received IPv4 PIMv2 packets. An attacker could exploit this vulnerability by sending a crafted PIMv2 packet to a PIM-enabled interface on an affected device. A successful exploit could allow the attacker to cause an affected device to reload, resulting in a DoS condition. Note: This vulnerability can be exploited with either an IPv4 multicast or unicast packet.
CVE-2024-20433
A vulnerability in the Resource Reservation Protocol (RSVP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is due to a buffer overflow when processing crafted RSVP packets. An attacker could exploit this vulnerability by sending RSVP traffic to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.
CVE-2024-20324
A vulnerability in the CLI of Cisco IOS XE Software could allow an authenticated, low-privileged, local attacker to access WLAN configuration details including passwords. This vulnerability is due to improper privilege checks. An attacker could exploit this vulnerability by using the show and show tech wireless CLI commands to access configuration details, including passwords. A successful exploit could allow the attacker to access configuration details that they are not authorized to access.
CVE-2024-20316
A vulnerability in the data model interface (DMI) services of Cisco IOS XE Software could allow an unauthenticated, remote attacker to access resources that should have been protected by a configured IPv4 access control list (ACL). This vulnerability is due to improper handling of error conditions when a successfully authorized device administrator updates an IPv4 ACL using the NETCONF or RESTCONF protocol, and the update would reorder access control entries (ACEs) in the updated ACL. An attacker could exploit this vulnerability by accessing resources that should have been protected across an affected device.
CVE-2023-20187
A vulnerability in the Multicast Leaf Recycle Elimination (mLRE) feature of Cisco IOS XE Software for Cisco ASR 1000 Series Aggregation Services Routers could allow an unauthenticated, remote attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition. This vulnerability is due to incorrect handling of certain IPv6 multicast packets when they are fanned out more than seven times on an affected device. An attacker could exploit this vulnerability by sending a specific IPv6 multicast or IPv6 multicast VPN (MVPNv6) packet through the affected device. A successful exploit could allow the attacker to cause a reload of the affected device, resulting in a DoS condition.
CVE-2023-20231
A vulnerability in the web UI of Cisco IOS XE Software could allow an authenticated, remote attacker to perform an injection attack against an affected device. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted input to the web UI. A successful exploit could allow the attacker to execute arbitrary Cisco IOS XE Software CLI commands with level 15 privileges. Note: This vulnerability is exploitable only if the attacker obtains the credentials for a Lobby Ambassador account. This account is not configured by default.
CVE-2019-1759
A vulnerability in access control list (ACL) functionality of the Gigabit Ethernet Management interface of Cisco IOS XE Software could allow an unauthenticated, remote attacker to reach the configured IP addresses on the Gigabit Ethernet Management interface. The vulnerability is due to a logic error that was introduced in the Cisco IOS XE Software 16.1.1 Release, which prevents the ACL from working when applied against the management interface. An attacker could exploit this issue by attempting to access the device via the management interface.
CVE-2019-1755
A vulnerability in the Web Services Management Agent (WSMA) function of Cisco IOS XE Software could allow an authenticated, remote attacker to execute arbitrary Cisco IOS commands as a privilege level 15 user. The vulnerability occurs because the affected software improperly sanitizes user-supplied input. An attacker could exploit this vulnerability by submitting crafted HTTP requests to the targeted application. A successful exploit could allow the attacker to execute arbitrary commands on the affected device.
CVE-2019-1742
A vulnerability in the web UI of Cisco IOS XE Software could allow an unauthenticated, remote attacker to access sensitive configuration information. The vulnerability is due to improper access control to files within the web UI. An attacker could exploit this vulnerability by sending a malicious request to an affected device. A successful exploit could allow the attacker to gain access to sensitive configuration information.